메뉴 건너뛰기




Volumn 8784, Issue , 2013, Pages

A protect solution for data security in mobile cloud storage

Author keywords

cloud storage; data security; protect solution; searchable encryption; trusted computing

Indexed keywords

CLOUD STORAGE SYSTEMS; CLOUD STORAGES; DATA SECURITY RISKS; PROTECTION ARCHITECTURE; SEARCHABLE ENCRYPTIONS; SECURITY AND PERFORMANCE; TRUSTED COMPUTING; TRUSTED COMPUTING TECHNOLOGY;

EID: 84879768904     PISSN: 0277786X     EISSN: 1996756X     Source Type: Conference Proceeding    
DOI: 10.1117/12.2014030     Document Type: Conference Paper
Times cited : (3)

References (9)
  • 1
    • 77954695824 scopus 로고    scopus 로고
    • March
    • Cloud Security Alliance .Top Threats to Cloud Computing, March 2010 https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf.
    • (2010) Top Threats to Cloud Computing
  • 2
    • 70449482830 scopus 로고    scopus 로고
    • Recommendations of the National Institute of Standards and Technology NIST Special Publication 800-124
    • Wayne Jansen and Karen Scarfone .Guidelines on Cell Phone and PDA Security. Recommendations of the National Institute of Standards and Technology NIST Special Publication 800-124 .2008. http://csrc.nist.gov/publications/ nistpubs/800-124/SP800-124.pdf.
    • (2008) Guidelines on Cell Phone and PDA Security
    • Jansen, W.1    Scarfone, K.2
  • 4
    • 84879776283 scopus 로고    scopus 로고
    • Eu-Jin Goh Secure Indexes Cryptology ePrint Archive, Report 2003/216
    • Eu-Jin Goh Secure Indexes Cryptology ePrint Archive, Report 2003/216, http://eprint.iacr.org/2003/216/.
  • 5
    • 35048901123 scopus 로고    scopus 로고
    • Public key encryption with keyword search
    • 2004 Springer Berlin/Heidelberg. Lecture Notes in Computer Science
    • Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search. ADVANCES IN CRYPTOLOGY-EUROCRYPT 2004 Springer Berlin/Heidelberg. Lecture Notes in Computer Science,Vol 3027, 2004. 506-522.
    • (2004) ADVANCES in CRYPTOLOGY-EUROCRYPT , vol.3027 , pp. 506-522
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3
  • 6
    • 77953308681 scopus 로고    scopus 로고
    • Fuzzy keyword search over encrypted data in cloud computing
    • IEEE
    • Jin Li, Qian Wang, Cong Wang Fuzzy Keyword Search over Encrypted Data in Cloud Computing. In proceedings of INFOCOM 2010 IEEE : pp1-5.
    • (2010) Proceedings of INFOCOM , pp. 1-5
    • Li, J.1    Wang, Q.2    Wang, C.3
  • 7
    • 84879749208 scopus 로고    scopus 로고
    • Mobile Trusted Module Specification version 1. 0 Revision 6, 26 June 2008.
    • TCG Mobile Trusted Module Specification version 1.0 Revision 6,26 June 2008. http://www.trustedcomputinggroup.org/.
  • 8
    • 84860161867 scopus 로고    scopus 로고
    • Trusted mobile client for document security in mobile office automation I. J
    • Xiaojun Yu, Qiaoyan Wen. Trusted Mobile Client for Document Security in Mobile Office Automation I.J. Information Technology and Computer Science, 2011, 1, 54-62.
    • (2011) Information Technology and Computer Science , vol.1 , pp. 54-62
    • Yu, X.1    Wen, Q.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.